According to https://datatracker.ietf.org/doc/html/rfc8446#section-4.1.3

A client which receives a legacy_session_id_echo field that does not match what
it sent in the ClientHello MUST abort the handshake with an "illegal_parameter" 
alert.

So we can't use the legacy_session_id_echo of SH.

> On Sep 11, 2024, at 17:35, A A <tom25...@yandex.com> wrote:
> 
> I don't think need to use random, we can use Session ID, which is deprecated 
> since TLS 1.3. Random is used to derive master key, AFAIK.
> 

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to